Global Patent Index - EP 2858296 A3

EP 2858296 A3 20150902 - Information processing technique for secure pattern matching

Title (en)

Information processing technique for secure pattern matching

Title (de)

Informationsverarbeitungstechnik für sicheren Strukturabgleich

Title (fr)

Technique de traitement d'informations permettant de fixer un appariement de formes sécurisé

Publication

EP 2858296 A3 20150902 (EN)

Application

EP 14179107 A 20140730

Priority

JP 2013163793 A 20130807

Abstract (en)

[origin: US2015046708A1] An encrypted first polynomial that is obtained by encrypting, in a homomorphic encryption method that handles a polynomial processing, a first polynomial, is received from another computer. The first polynomial is represented by using, as coefficients, components of a first binary vector generated from first data in first order that is either ascending order or descending order with respect to degree of the first polynomial. Then, a predetermined processing in an encrypted text space is performed by using the encrypted first polynomial and an encrypted second polynomial that is obtained by encrypting a second polynomial in the homomorphic encryption method. The second polynomial is represented by using, as coefficients, components of a second binary vector generated from second data in second order that is different from the first order with respect to degree of the second polynomial. Then, a result of the predetermined processing is sent back.

IPC 8 full level

H04L 9/00 (2006.01)

CPC (source: EP US)

H04L 9/008 (2013.01 - EP US); H04L 9/14 (2013.01 - US); H04L 9/3093 (2013.01 - EP); H04L 2209/24 (2013.01 - US)

Citation (search report)

  • [XP] MASAYA YASUDA ET AL: "Secure pattern matching using somewhat homomorphic encryption", CLOUD COMPUTING SECURITY WORKSHOP, ACM, 2 PENN PLAZA, SUITE 701 NEW YORK NY 10121-0701 USA, 8 November 2013 (2013-11-08), pages 65 - 76, XP058034246, ISBN: 978-1-4503-2490-8, DOI: 10.1145/2517488.2517497
  • [XY] YASUDA MASAYA ET AL: "Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices", 13 September 2012, ADVANCES IN COMMUNICATION NETWORKING : 20TH EUNICE/IFIP EG 6.2, 6.6 INTERNATIONAL WORKSHOP, RENNES, FRANCE, SEPTEMBER 1-5, 2014, REVISED SELECTED PAPERS; [LECTURE NOTES IN COMPUTER SCIENCE , ISSN 1611-3349], SPRINGER VERLAG, DE, PAGE(S) 1 - 16, ISBN: 978-3-319-21667-6, ISSN: 0302-9743, XP047037754
  • [Y] LAGENDIJK R L ET AL: "Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation", IEEE SIGNAL PROCESSING MAGAZINE, IEEE SERVICE CENTER, PISCATAWAY, NJ, US, vol. 30, no. 1, 1 January 2013 (2013-01-01), pages 82 - 105, XP011505535, ISSN: 1053-5888, DOI: 10.1109/MSP.2012.2219653
  • [Y] JOSHUA BARON ET AL: "5PM: Secure Pattern Matching", INTERNATIONAL ASSOCIATION FOR CRYPTOLOGIC RESEARCH,, vol. 20121219:161334, 12 December 2012 (2012-12-12), pages 1 - 77, XP061007031

Designated contracting state (EPC)

AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

Designated extension state (EPC)

BA ME

DOCDB simple family (publication)

US 2015046708 A1 20150212; US 9509493 B2 20161129; EP 2858296 A2 20150408; EP 2858296 A3 20150902; EP 2858296 B1 20191225; JP 2015031935 A 20150216; JP 6244728 B2 20171213

DOCDB simple family (application)

US 201414446772 A 20140730; EP 14179107 A 20140730; JP 2013163793 A 20130807